Last active
October 12, 2020 23:26
-
-
Save zhill/0adba9905dd212c7c6f9935497df74fc to your computer and use it in GitHub Desktop.
Updated default Anchore Scan Action example workflow
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This workflow checks out code, builds an image, performs a container image | |
# vulnerability scan with Anchore's Grype tool, and integrates the results with GitHub Advanced Security | |
# code scanning feature. For more information on the Anchore scan action usage | |
# and parameters, see https://github.com/anchore/scan-action. For more | |
# information on Anchore's container image scanning tool Grype, see | |
# https://github.com/anchore/grype | |
name: Anchore Container Scan | |
on: push | |
jobs: | |
Anchore-Build-Scan: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout the code | |
uses: actions/checkout@v2 | |
- name: Build the Docker image | |
run: docker build . --file Dockerfile --tag localbuild/testimage:latest | |
- name: Run the Anchore scan action itself with GitHub Advanced Security code scanning integration enabled | |
uses: anchore/scan-action@main | |
with: | |
image: "localbuild/testimage:latest" | |
acs-report-enable: true | |
- name: Upload Anchore Scan Report | |
uses: github/codeql-action/upload-sarif@v1 | |
with: | |
sarif_file: results.sarif |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment